Biblio
Export 21463 results:
Mobile Communications. New York: Addison-Wesley, 2000.
Modelling Combat using Fractals and the Statistics of Scaling Systems." Military Operations Research 5, no. 3 (2000): 47-58.
"Models of coordination In International Workshop on Engineering Societies in the Agents’ World ESAW’00 . Italy, 2000.
Modern Terrorism: An Analysis of Modern Trends . Moscow: Harvest, 2000.
The Moldovans: Romania, Russia, and the Politics of Culture . Stanford, CA: Hoover Institution Press, 2000.
More Consultants Offering Technical Help to Ensure Security." Business Insurance (2000).
"A multiagent approach for electronic travel planning In Second International Bi-Conference Workshop on Agent-Oriented Information Systems AOIS-2000. Austin, TX, USA, 2000.
Multitarget-Multisensor Tracking: Applications and Advances. Vol. 3. Norwood, MA: Artech House, 2000.
National Military Command Center Technical Architecture Description. Hanscom AFB, MA: USAF Electronic Systems Center, 2000.
National Security and the European Convention of Human Rights. Dordrecht: Kluwer Law International, 2000.
"National Security Concept of the Russian Federation." Rossiiskaya Gazeta (2000).
National Security Law of Latvia. Likumi.lv, 2000.
NATO C3 Technical Architecture In NATO Open Systems Working Group. Brussels, Belgium: NATO Open Systems Working Group: Allied Data Publication (ADat-P), 2000.
NATO Chief Says More Police Vital in Kosovo." American Forces Information Service (2000).
"NATO Expansion and Implications for Southern Tier Stability." In Crossroads and Conflict: Security and Foreign Policy in the Caucasus and Central Asia, 130. New York: Routledge, 2000.
"NATO Needs New Forces for New Challenges. The Independent (U.K.), 2000.
NATO’s Open Door Policy and the Next Round of Enlargement." Parameters 30 (2000): 53-66.
"A Naturalistic Decision Making Model for Simulated Human Combatants In Ninth Conference on Computer Generated Forces and Behavioral Representation. Orlando FL, 2000.
Network Centric Warfare. Washington, D.C.: Department of Defense, C4ISR Cooperative Research Program, 2000.
Network Centric Warfare; Developing and Leveraging Information Superiority. Washington DC: CCRP, DoD, USA, 2000, 2000.
Network Intrusion Detection: An Analyst’s Handbook." Information & Security: An International Journal 4 (2000): 125-146.
"Network Security Fundamentals." Information & Security: An International Journal 4 (2000): 121-122.
"